{"id":290,"date":"2023-04-17T01:31:06","date_gmt":"2023-04-17T01:31:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sean-williams\/?p=290"},"modified":"2023-04-17T01:31:06","modified_gmt":"2023-04-17T01:31:06","slug":"write-up-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/sean-williams\/2023\/04\/17\/write-up-the-cia-triad\/","title":{"rendered":"Write-Up: The CIA Triad"},"content":{"rendered":"\n<p>Name: Sean Williams<br>Date: 1\/29\/2023<br><br>BLUF<br><em>This paper is ideally a deeper explanation of what the CIA triad is and what it does in the<br>business scene. It will also explain what authentication and authorization are, then show<br>how different the two are.<\/em><\/p>\n\n\n\n<p><br><strong>CIA Triad<\/strong><br>The Cia Triad came to be around 1998 through the combination of 3 concepts that sew the<br>group together: Confidentiality, Integrity, and Availability. Confidentiality helps set rules when it<br>comes to looking a certain info online, availability is to show how the information for those who<br>are authorized to it can get it anytime, integrity is the assurance that the information is reliable<br>and can be something you can put your faith in. This creates one of the most widespread,<br>strongest cybersecurity foundations that guides information through the organization where no<br>outside party can break in and see. Not only is the organization popular for its protection, but it<br>can also be more beneficial when it comes down to collecting information. Though over the<br>years they seem to need an upgraded sense one of their biggest problems is with having enabled<br>devices to go unpatched and get set with weak passwords.<\/p>\n\n\n\n<p><br><strong>Authentication Vs Authorization<\/strong><br>Both mentioned terms can be seen as the same but have entirely different roles in online data<br>and in securing your protection as well. Authorization is the process to confirm what a person<br>has control over. For example, authorization is like being able to play and mess around with your<br>friends because they know you, but it\u2019s not allowed to play and mess around with a teacher<br>because it\u2019s prohibited to do that in class. While authentication is the process of confirming who<br>the user is making themselves know. For example, authentication is like knocking on your<br>house door and having you ask who it is, which then you say it&#8217;s you and sometimes give a<br>password letting know it\u2019s you are let in. Though both of the terms even though they are<br>different, are essential for keeping security on the web and keeping the information coming from<br>outsiders.<\/p>\n\n\n\n<p><br><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Now that we understand the importance of knowing why confidentiality, Integrity, and Availability<br>should always hold true in such an environment as the CIA triad. Without having it nothing<br>online is able to be protected and anybody can steal info like dark companies that plan to use it<br>to hurt them. This also explains how why knowing the difference between both Authentication<br>and Authorization put effort into securing people online and keeping their<br>information the same for people who don\u2019t have the proper authentication for the devices so they<br>can be denied authorization to their information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name: Sean WilliamsDate: 1\/29\/2023 BLUFThis paper is ideally a deeper explanation of what the CIA triad is and what it does in thebusiness scene. It will also explain what authentication and authorization are, then showhow different the two are. CIA TriadThe Cia Triad came to be around 1998 through the combination of 3 concepts that&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sean-williams\/2023\/04\/17\/write-up-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":26223,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/posts\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/users\/26223"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/posts\/290\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}